Monthly Archives: April 2016

A German nuclear power plant near Munich reportedly was found infected with malware. RWE, the German utility that runs the facility, has confirmed that since the plant is cut off from Internet, the malware infection did not affect or harm operations, according to Reuters. Conficker and W32.Ramnit malware were discovered in unit B of the

Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. Qatar National Bank is probing reports of an online leak of confidential data of a large number

If you’re one of the millions of people around the world who count themselves as Spotify users, we have some troubling news: it looks like Spotify recently suffered a security breach. A list containing hundreds of sets of account credentials was published late last week to popular anonymous text file sharing site Pastebin, and several of

India's best ethical hacker and an Indian entrepreneur, has been recognized with the InfoSec Maestro Award along with being named a winner among Top CISO's of India in 2016 at the All India Infosec Maestro Conference summit. Pavankumar Bolisetty, one of India's best ethical hacker and an Indian entrepreneur, and extremely well known in the

CBS recently fixed a vulnerability in its popular Sports application that could have exposed users to man-in-the-middle attacks and inadvertently leaked personal data. According to researchers, upon registration, users’ names, email addresses, account passwords, dates of birth, and zip codes were all sent over an unencrypted connection, in cleartext, to the app’s servers. Both the Android

The FBI is warning people about a business email scheme which has resulted in huge losses to companies in Phoenix and other U.S. cities. Here’s how the scam works: A CEO seemingly emails an employee — typically in a finance or administrative role — instructing them to perform a wire transfer. The employee follows directions

You may have heard the term ‘two-factor’ or ‘multi-factor’ authentication. If you haven’t heard of these terms, chances are you’ve experienced this and not even known it. The interesting thing is that two factor authentication is one of the best ways to protect your accounts from being hacked. So what exactly is it? Well traditional

In the latest edition of their Global Economic Crime Survey, PricewaterhouseCoopers have announced a finding of a 20% increase in cybercrime, making it the fastest growing category of economic crime. The UK seems to be the most severely affected, with 55% of organisations being affected by some type of cybercrime, higher than the US which

Even if an application has been built following security and defensive coding best practices, it will still require significant testing before it's ready for release. Whether this is routine testing for common vulnerabilities or security-focused penetration testing to pick up on the types of problems that often slip through the cracks, following security best practices